Feature

device posture check

Device Posture Check

Detect non-compliant devices and block their entry to your perimeter. Define your own device policy and enforce it in real-time. GoodAccess Device Posture Check is BYOD security made simple.

Device Posture Check is fully integrated in GoodAccess client apps and managed and enforced centrally.

Create Free AccountSee Demo

Try GoodAccess for free.
No card needed. Full onboarding support.

BENEFITS

Protect your perimeter from untrusted and vulnerable devices

Dynamic device security policies

Tailor device security requirements to your company’s needs and enforce them in real-time.

Main benefit

Easy to use

Easy access management

Monitor any device that connects to your SDP with zero additional investment.

Main benefit

Endpoint visibility and control

Gain full control over connecting devices and monitor their health and connection details in one place.

Main benefit

See GoodAccess in action

Try Interactive Demo

Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.

FEATURES

Device Posture Check weeds out violations to your security policy

Gateway network

Global shared gateway network

Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.

network control and visibility
network control and visibility

Threat protection

Online Threat Protection

Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.

Goodaccess app

Mobile and desktop apps

GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.

Protection

Protection from untrusted devices

Create your own device security policy and enforce it centrally. Weed out non-compliant devices and block them from accessing your network. Enable easy BYOD remote access with zero additional hardware or software tools.

Control management

More control and easier management

Monitor the health of all user devices in one place. Check their access history and health track record. Adjust your policy from a central UI and enforce it in real-time.

Compliant

Better compliance

Assure device security compliance with standards and regulations like SOC 2, NIS 2, ISO 27001, and HIPAA.

Create Free Account

No card required.

Full onboarding support.

testimonials

What is first-hand experience with a GoodAccess like?

We were looking for fast, secure, and quality audio transmission. We are excited that GoodAccess allows our agents to make phone calls with our clients via VOIP provider using the office IP from their home. GoodAccess is inexpensive, easy-to-use, safe, and the support team is brilliant!

Petr Hruška
Co-founder & CEO at Conexiondiaria

GoodAccess has strong encryption which shows to our customers that we take great care in protecting their data. The app is straightforward to use so we can access our systems from 14 different time zones and work efficiently. Simply a VPN with static IP for a great price.

Paraic Hegarty
CTO at Akari Software

It's important for us that GoodAccess' VPN with static IP is fast & has low latency, which feels like working from the office. I love the user friendly control panel, which just makes the work much easier!

Jan Svoboda
CEO at XDENT

GoodAccess increases the level of security in our organization. We use it to access several cloud services and our data warehouse. We appreciate the customer-oriented support team, frequent product updates, and the excellent price/value ratio.

Petr Jirásek
Co-founder & CTO at Tipli

3 QUICK STEPS AWAY

Let’s get started

Create a free account

Test all premium features for 14 days without limitation. No credit card required.

Select your gateway

Choose a gateway near your location, and connect.

Connect your assets

Invite team members and build your secure environment in 10 minutes.

Create Free Account

No card needed. Full onboarding support.

Get in touch

Not sure where to start? Let's get in touch

Schedule a call with the GoodAccess success manager to get all the details about our product features.

Other features

Explore other features

System-level access logs

Monitor access on the system level, spot suspicious behaviors, and intervene before the problem escalates.

Get Started

Zero trust access control

Minimize the attack surface by robust user authentication, granular privilege assignment, and strong encryption.

Get Started

DNS filtering

Protect your network from phishing attempts, malicious domains, or productivity sinks.

Get Started

device posture check guide

Complete guide to GoodAccess Device Posture Check

The Device Posture Check is a security measure integrated into the GoodAccess client app that checks whether the user device meets security policy. It does so immediately after installing the agent on the device, after the user logs in, and periodically every 30 minutes.

You can set up a security policy using a custom mix of criteria, e.g. lock screen protection, OS type and version, active antivirus software, specified registry key, etc. For a comprehensive list of restrictions, please refer to our Support Portal.

Non-compliant devices will be logged, the admin will be notified, and (optionally) the device will be blocked from accessing resources within the perimeter.

Device Posture Check is available for devices of all major platforms—Windows, macOS, iOS, iPadOS, Android, and Linux.

How the Device Posture Check works

  • Whenever the user logs in their application, the Device Posture Check assesses the device against your policy restrictions. This also occurs every 30 minutes while the application is running.

  • Each policy restriction is evaluated individually, and the device must meet all of them.

  • Depending on the outcome of the Posture Check, the device is either granted or denied access to your SDP.

  • The Device Posture Check will continuously watch for changes in policy restrictions. When you make changes, devices that fail to comply with the new criteria will be disconnected.

  • You can monitor all your users’ connected devices, their security posture, and the outcomes of past checks from the Control Panel.

Visit Support Portal
Not a company? Try VPN Static for individuals
Thank you! Your submission has been received!
By submitting this form you agree with creation of Samohyb Account, Terms of Service and Privacy Policy.

Frequently asked questions

Device Posture Check FAQ

What is security posture?
Why is Device Posture Check important?
Does the Device Posture Check require any hardware?
What happens when a device fails a Posture Check?
Can users bypass or disable Device Posture Check?
Can I set up different policy restrictions for different users?
When a device fails a Posture Check, will the user know what is wrong?